zia.AdminUsers
Explore with Pulumi AI
The zia_admin_users resource allows the creation and management of ZIA admin user account created in the Zscaler Internet Access cloud or via the API.
Example Usage
Organization Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
name: "Super Admin",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
loginName: "john.smith@acme.com",
userName: "John Smith",
email: "john.smith@acme.com",
isPasswordLoginAllowed: true,
password: "*********************",
isSecurityReportCommEnabled: true,
isServiceUpdateCommEnabled: true,
isProductUpdateCommEnabled: true,
comments: "Administrator User",
roles: [{
id: superAdmin.then(superAdmin => superAdmin.id),
}],
adminScopeType: "ORGANIZATION",
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
login_name="john.smith@acme.com",
user_name="John Smith",
email="john.smith@acme.com",
is_password_login_allowed=True,
password="*********************",
is_security_report_comm_enabled=True,
is_service_update_comm_enabled=True,
is_product_update_comm_enabled=True,
comments="Administrator User",
roles=[zia.AdminUsersRoleArgs(
id=super_admin.id,
)],
admin_scope_type="ORGANIZATION")
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
Name: pulumi.StringRef("Super Admin"),
}, nil)
if err != nil {
return err
}
// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
LoginName: pulumi.String("john.smith@acme.com"),
UserName: pulumi.String("John Smith"),
Email: pulumi.String("john.smith@acme.com"),
IsPasswordLoginAllowed: pulumi.Bool(true),
Password: pulumi.String("*********************"),
IsSecurityReportCommEnabled: pulumi.Bool(true),
IsServiceUpdateCommEnabled: pulumi.Bool(true),
IsProductUpdateCommEnabled: pulumi.Bool(true),
Comments: pulumi.String("Administrator User"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(superAdmin.Id),
},
},
AdminScopeType: pulumi.String("ORGANIZATION"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var superAdmin = Zia.GetAdminRoles.Invoke(new()
{
Name = "Super Admin",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new Zia.AdminUsers("johnSmith", new()
{
LoginName = "john.smith@acme.com",
UserName = "John Smith",
Email = "john.smith@acme.com",
IsPasswordLoginAllowed = true,
Password = "*********************",
IsSecurityReportCommEnabled = true,
IsServiceUpdateCommEnabled = true,
IsProductUpdateCommEnabled = true,
Comments = "Administrator User",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
},
},
AdminScopeType = "ORGANIZATION",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
.name("Super Admin")
.build());
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
.loginName("john.smith@acme.com")
.userName("John Smith")
.email("john.smith@acme.com")
.isPasswordLoginAllowed(true)
.password("*********************")
.isSecurityReportCommEnabled(true)
.isServiceUpdateCommEnabled(true)
.isProductUpdateCommEnabled(true)
.comments("Administrator User")
.roles(AdminUsersRoleArgs.builder()
.id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
.build())
.adminScopeType("ORGANIZATION")
.build());
}
}
resources:
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
johnSmith:
type: zia:AdminUsers
properties:
loginName: john.smith@acme.com
userName: John Smith
email: john.smith@acme.com
isPasswordLoginAllowed: true
password: '*********************'
isSecurityReportCommEnabled: true
isServiceUpdateCommEnabled: true
isProductUpdateCommEnabled: true
comments: Administrator User
roles:
- id: ${superAdmin.id}
adminScopeType: ORGANIZATION
variables:
superAdmin:
fn::invoke:
Function: zia:getAdminRoles
Arguments:
name: Super Admin
Department Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
name: "Super Admin",
});
const engineering = zia.getDepartmentManagement({
name: "Engineering",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
loginName: "john.smith@acme.com",
userName: "John Smith",
email: "john.smith@acme.com",
isPasswordLoginAllowed: true,
password: "*********************",
isSecurityReportCommEnabled: true,
isServiceUpdateCommEnabled: true,
isProductUpdateCommEnabled: true,
comments: "Administrator User",
roles: [{
id: superAdmin.then(superAdmin => superAdmin.id),
}],
adminScopeType: "DEPARTMENT",
adminScopeEntities: {
ids: [
engineering.then(engineering => engineering.id),
data.zia_department_management.sales.id,
],
},
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
engineering = zia.get_department_management(name="Engineering")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
login_name="john.smith@acme.com",
user_name="John Smith",
email="john.smith@acme.com",
is_password_login_allowed=True,
password="*********************",
is_security_report_comm_enabled=True,
is_service_update_comm_enabled=True,
is_product_update_comm_enabled=True,
comments="Administrator User",
roles=[zia.AdminUsersRoleArgs(
id=super_admin.id,
)],
admin_scope_type="DEPARTMENT",
admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
ids=[
engineering.id,
data["zia_department_management"]["sales"]["id"],
],
))
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
Name: pulumi.StringRef("Super Admin"),
}, nil)
if err != nil {
return err
}
engineering, err := zia.GetDepartmentManagement(ctx, &zia.GetDepartmentManagementArgs{
Name: pulumi.StringRef("Engineering"),
}, nil)
if err != nil {
return err
}
// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
LoginName: pulumi.String("john.smith@acme.com"),
UserName: pulumi.String("John Smith"),
Email: pulumi.String("john.smith@acme.com"),
IsPasswordLoginAllowed: pulumi.Bool(true),
Password: pulumi.String("*********************"),
IsSecurityReportCommEnabled: pulumi.Bool(true),
IsServiceUpdateCommEnabled: pulumi.Bool(true),
IsProductUpdateCommEnabled: pulumi.Bool(true),
Comments: pulumi.String("Administrator User"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(superAdmin.Id),
},
},
AdminScopeType: pulumi.String("DEPARTMENT"),
AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
Ids: pulumi.IntArray{
pulumi.Int(engineering.Id),
data.Zia_department_management.Sales.Id,
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var superAdmin = Zia.GetAdminRoles.Invoke(new()
{
Name = "Super Admin",
});
var engineering = Zia.GetDepartmentManagement.Invoke(new()
{
Name = "Engineering",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new Zia.AdminUsers("johnSmith", new()
{
LoginName = "john.smith@acme.com",
UserName = "John Smith",
Email = "john.smith@acme.com",
IsPasswordLoginAllowed = true,
Password = "*********************",
IsSecurityReportCommEnabled = true,
IsServiceUpdateCommEnabled = true,
IsProductUpdateCommEnabled = true,
Comments = "Administrator User",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
},
},
AdminScopeType = "DEPARTMENT",
AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
{
Ids = new[]
{
engineering.Apply(getDepartmentManagementResult => getDepartmentManagementResult.Id),
data.Zia_department_management.Sales.Id,
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.inputs.GetDepartmentManagementArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
.name("Super Admin")
.build());
final var engineering = ZiaFunctions.getDepartmentManagement(GetDepartmentManagementArgs.builder()
.name("Engineering")
.build());
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
.loginName("john.smith@acme.com")
.userName("John Smith")
.email("john.smith@acme.com")
.isPasswordLoginAllowed(true)
.password("*********************")
.isSecurityReportCommEnabled(true)
.isServiceUpdateCommEnabled(true)
.isProductUpdateCommEnabled(true)
.comments("Administrator User")
.roles(AdminUsersRoleArgs.builder()
.id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
.build())
.adminScopeType("DEPARTMENT")
.adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
.ids(
engineering.applyValue(getDepartmentManagementResult -> getDepartmentManagementResult.id()),
data.zia_department_management().sales().id())
.build())
.build());
}
}
resources:
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
johnSmith:
type: zia:AdminUsers
properties:
loginName: john.smith@acme.com
userName: John Smith
email: john.smith@acme.com
isPasswordLoginAllowed: true
password: '*********************'
isSecurityReportCommEnabled: true
isServiceUpdateCommEnabled: true
isProductUpdateCommEnabled: true
comments: Administrator User
roles:
- id: ${superAdmin.id}
adminScopeType: DEPARTMENT
adminScopeEntities:
ids:
- ${engineering.id}
- ${data.zia_department_management.sales.id}
variables:
superAdmin:
fn::invoke:
Function: zia:getAdminRoles
Arguments:
name: Super Admin
engineering:
fn::invoke:
Function: zia:getDepartmentManagement
Arguments:
name: Engineering
Location Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
name: "Super Admin",
});
const auSydneyBranch01 = zia.getLocationManagement({
name: "AU - Sydney - Branch01",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
loginName: "john.smith@acme.com",
userName: "John Smith",
email: "john.smith@acme.com",
isPasswordLoginAllowed: true,
password: "*********************",
isSecurityReportCommEnabled: true,
isServiceUpdateCommEnabled: true,
isProductUpdateCommEnabled: true,
comments: "Administrator User",
roles: [{
id: superAdmin.then(superAdmin => superAdmin.id),
}],
adminScopeType: "LOCATION",
adminScopeEntities: {
ids: [auSydneyBranch01.then(auSydneyBranch01 => auSydneyBranch01.id)],
},
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
au_sydney_branch01 = zia.get_location_management(name="AU - Sydney - Branch01")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
login_name="john.smith@acme.com",
user_name="John Smith",
email="john.smith@acme.com",
is_password_login_allowed=True,
password="*********************",
is_security_report_comm_enabled=True,
is_service_update_comm_enabled=True,
is_product_update_comm_enabled=True,
comments="Administrator User",
roles=[zia.AdminUsersRoleArgs(
id=super_admin.id,
)],
admin_scope_type="LOCATION",
admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
ids=[au_sydney_branch01.id],
))
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
Name: pulumi.StringRef("Super Admin"),
}, nil)
if err != nil {
return err
}
auSydneyBranch01, err := zia.LookupLocationManagement(ctx, &zia.LookupLocationManagementArgs{
Name: pulumi.StringRef("AU - Sydney - Branch01"),
}, nil)
if err != nil {
return err
}
// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
LoginName: pulumi.String("john.smith@acme.com"),
UserName: pulumi.String("John Smith"),
Email: pulumi.String("john.smith@acme.com"),
IsPasswordLoginAllowed: pulumi.Bool(true),
Password: pulumi.String("*********************"),
IsSecurityReportCommEnabled: pulumi.Bool(true),
IsServiceUpdateCommEnabled: pulumi.Bool(true),
IsProductUpdateCommEnabled: pulumi.Bool(true),
Comments: pulumi.String("Administrator User"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(superAdmin.Id),
},
},
AdminScopeType: pulumi.String("LOCATION"),
AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
Ids: pulumi.IntArray{
pulumi.Int(auSydneyBranch01.Id),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var superAdmin = Zia.GetAdminRoles.Invoke(new()
{
Name = "Super Admin",
});
var auSydneyBranch01 = Zia.GetLocationManagement.Invoke(new()
{
Name = "AU - Sydney - Branch01",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new Zia.AdminUsers("johnSmith", new()
{
LoginName = "john.smith@acme.com",
UserName = "John Smith",
Email = "john.smith@acme.com",
IsPasswordLoginAllowed = true,
Password = "*********************",
IsSecurityReportCommEnabled = true,
IsServiceUpdateCommEnabled = true,
IsProductUpdateCommEnabled = true,
Comments = "Administrator User",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
},
},
AdminScopeType = "LOCATION",
AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
{
Ids = new[]
{
auSydneyBranch01.Apply(getLocationManagementResult => getLocationManagementResult.Id),
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.inputs.GetLocationManagementArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
.name("Super Admin")
.build());
final var auSydneyBranch01 = ZiaFunctions.getLocationManagement(GetLocationManagementArgs.builder()
.name("AU - Sydney - Branch01")
.build());
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
.loginName("john.smith@acme.com")
.userName("John Smith")
.email("john.smith@acme.com")
.isPasswordLoginAllowed(true)
.password("*********************")
.isSecurityReportCommEnabled(true)
.isServiceUpdateCommEnabled(true)
.isProductUpdateCommEnabled(true)
.comments("Administrator User")
.roles(AdminUsersRoleArgs.builder()
.id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
.build())
.adminScopeType("LOCATION")
.adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
.ids(auSydneyBranch01.applyValue(getLocationManagementResult -> getLocationManagementResult.id()))
.build())
.build());
}
}
resources:
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
johnSmith:
type: zia:AdminUsers
properties:
loginName: john.smith@acme.com
userName: John Smith
email: john.smith@acme.com
isPasswordLoginAllowed: true
password: '*********************'
isSecurityReportCommEnabled: true
isServiceUpdateCommEnabled: true
isProductUpdateCommEnabled: true
comments: Administrator User
roles:
- id: ${superAdmin.id}
adminScopeType: LOCATION
adminScopeEntities:
ids:
- ${auSydneyBranch01.id}
variables:
superAdmin:
fn::invoke:
Function: zia:getAdminRoles
Arguments:
name: Super Admin
auSydneyBranch01:
fn::invoke:
Function: zia:getLocationManagement
Arguments:
name: AU - Sydney - Branch01
Location Group Scope
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@bdzscaler/pulumi-zia";
import * as zia from "@pulumi/zia";
const superAdmin = zia.getAdminRoles({
name: "Super Admin",
});
const corporateUserTrafficGroup = zia.getLocationGroups({
name: "Corporate User Traffic Group",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
const johnSmith = new zia.AdminUsers("johnSmith", {
loginName: "john.smith@acme.com",
userName: "John Smith",
email: "john.smith@acme.com",
isPasswordLoginAllowed: true,
password: "*********************",
isSecurityReportCommEnabled: true,
isServiceUpdateCommEnabled: true,
isProductUpdateCommEnabled: true,
comments: "Administrator User",
roles: [{
id: superAdmin.then(superAdmin => superAdmin.id),
}],
adminScopeType: "LOCATION_GROUP",
adminScopeEntities: {
ids: [corporateUserTrafficGroup.then(corporateUserTrafficGroup => corporateUserTrafficGroup.id)],
},
});
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
super_admin = zia.get_admin_roles(name="Super Admin")
corporate_user_traffic_group = zia.get_location_groups(name="Corporate User Traffic Group")
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
john_smith = zia.AdminUsers("johnSmith",
login_name="john.smith@acme.com",
user_name="John Smith",
email="john.smith@acme.com",
is_password_login_allowed=True,
password="*********************",
is_security_report_comm_enabled=True,
is_service_update_comm_enabled=True,
is_product_update_comm_enabled=True,
comments="Administrator User",
roles=[zia.AdminUsersRoleArgs(
id=super_admin.id,
)],
admin_scope_type="LOCATION_GROUP",
admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
ids=[corporate_user_traffic_group.id],
))
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
superAdmin, err := zia.GetAdminRoles(ctx, &zia.GetAdminRolesArgs{
Name: pulumi.StringRef("Super Admin"),
}, nil)
if err != nil {
return err
}
corporateUserTrafficGroup, err := zia.GetLocationGroups(ctx, &zia.GetLocationGroupsArgs{
Name: pulumi.StringRef("Corporate User Traffic Group"),
}, nil)
if err != nil {
return err
}
// ######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
_, err = zia.NewAdminUsers(ctx, "johnSmith", &zia.AdminUsersArgs{
LoginName: pulumi.String("john.smith@acme.com"),
UserName: pulumi.String("John Smith"),
Email: pulumi.String("john.smith@acme.com"),
IsPasswordLoginAllowed: pulumi.Bool(true),
Password: pulumi.String("*********************"),
IsSecurityReportCommEnabled: pulumi.Bool(true),
IsServiceUpdateCommEnabled: pulumi.Bool(true),
IsProductUpdateCommEnabled: pulumi.Bool(true),
Comments: pulumi.String("Administrator User"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(superAdmin.Id),
},
},
AdminScopeType: pulumi.String("LOCATION_GROUP"),
AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
Ids: pulumi.IntArray{
pulumi.Int(corporateUserTrafficGroup.Id),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var superAdmin = Zia.GetAdminRoles.Invoke(new()
{
Name = "Super Admin",
});
var corporateUserTrafficGroup = Zia.GetLocationGroups.Invoke(new()
{
Name = "Corporate User Traffic Group",
});
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new Zia.AdminUsers("johnSmith", new()
{
LoginName = "john.smith@acme.com",
UserName = "John Smith",
Email = "john.smith@acme.com",
IsPasswordLoginAllowed = true,
Password = "*********************",
IsSecurityReportCommEnabled = true,
IsServiceUpdateCommEnabled = true,
IsProductUpdateCommEnabled = true,
Comments = "Administrator User",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = superAdmin.Apply(getAdminRolesResult => getAdminRolesResult.Id),
},
},
AdminScopeType = "LOCATION_GROUP",
AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
{
Ids = new[]
{
corporateUserTrafficGroup.Apply(getLocationGroupsResult => getLocationGroupsResult.Id),
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.ZiaFunctions;
import com.pulumi.zia.inputs.GetAdminRolesArgs;
import com.pulumi.zia.inputs.GetLocationGroupsArgs;
import com.pulumi.zia.AdminUsers;
import com.pulumi.zia.AdminUsersArgs;
import com.pulumi.zia.inputs.AdminUsersRoleArgs;
import com.pulumi.zia.inputs.AdminUsersAdminScopeEntitiesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var superAdmin = ZiaFunctions.getAdminRoles(GetAdminRolesArgs.builder()
.name("Super Admin")
.build());
final var corporateUserTrafficGroup = ZiaFunctions.getLocationGroups(GetLocationGroupsArgs.builder()
.name("Corporate User Traffic Group")
.build());
//######## PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
var johnSmith = new AdminUsers("johnSmith", AdminUsersArgs.builder()
.loginName("john.smith@acme.com")
.userName("John Smith")
.email("john.smith@acme.com")
.isPasswordLoginAllowed(true)
.password("*********************")
.isSecurityReportCommEnabled(true)
.isServiceUpdateCommEnabled(true)
.isProductUpdateCommEnabled(true)
.comments("Administrator User")
.roles(AdminUsersRoleArgs.builder()
.id(superAdmin.applyValue(getAdminRolesResult -> getAdminRolesResult.id()))
.build())
.adminScopeType("LOCATION_GROUP")
.adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
.ids(corporateUserTrafficGroup.applyValue(getLocationGroupsResult -> getLocationGroupsResult.id()))
.build())
.build());
}
}
resources:
######### PASSWORDS IN THIS FILE ARE FAKE AND NOT USED IN PRODUCTION SYSTEMS #########
johnSmith:
type: zia:AdminUsers
properties:
loginName: john.smith@acme.com
userName: John Smith
email: john.smith@acme.com
isPasswordLoginAllowed: true
password: '*********************'
isSecurityReportCommEnabled: true
isServiceUpdateCommEnabled: true
isProductUpdateCommEnabled: true
comments: Administrator User
roles:
- id: ${superAdmin.id}
adminScopeType: LOCATION_GROUP
adminScopeEntities:
ids:
- ${corporateUserTrafficGroup.id}
variables:
superAdmin:
fn::invoke:
Function: zia:getAdminRoles
Arguments:
name: Super Admin
corporateUserTrafficGroup:
fn::invoke:
Function: zia:getLocationGroups
Arguments:
name: Corporate User Traffic Group
Create AdminUsers Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AdminUsers(name: string, args: AdminUsersArgs, opts?: CustomResourceOptions);
@overload
def AdminUsers(resource_name: str,
args: AdminUsersArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AdminUsers(resource_name: str,
opts: Optional[ResourceOptions] = None,
email: Optional[str] = None,
username: Optional[str] = None,
login_name: Optional[str] = None,
is_password_expired: Optional[bool] = None,
is_product_update_comm_enabled: Optional[bool] = None,
is_auditor: Optional[bool] = None,
is_exec_mobile_app_enabled: Optional[bool] = None,
is_non_editable: Optional[bool] = None,
admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
is_password_login_allowed: Optional[bool] = None,
disabled: Optional[bool] = None,
is_security_report_comm_enabled: Optional[bool] = None,
is_service_update_comm_enabled: Optional[bool] = None,
comments: Optional[str] = None,
password: Optional[str] = None,
roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
admin_scope_type: Optional[str] = None)
func NewAdminUsers(ctx *Context, name string, args AdminUsersArgs, opts ...ResourceOption) (*AdminUsers, error)
public AdminUsers(string name, AdminUsersArgs args, CustomResourceOptions? opts = null)
public AdminUsers(String name, AdminUsersArgs args)
public AdminUsers(String name, AdminUsersArgs args, CustomResourceOptions options)
type: zia:AdminUsers
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AdminUsersArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var adminUsersResource = new Zia.AdminUsers("adminUsersResource", new()
{
Email = "string",
Username = "string",
LoginName = "string",
IsPasswordExpired = false,
IsProductUpdateCommEnabled = false,
IsAuditor = false,
IsExecMobileAppEnabled = false,
IsNonEditable = false,
AdminScopeEntities = new Zia.Inputs.AdminUsersAdminScopeEntitiesArgs
{
Ids = new[]
{
0,
},
},
IsPasswordLoginAllowed = false,
Disabled = false,
IsSecurityReportCommEnabled = false,
IsServiceUpdateCommEnabled = false,
Comments = "string",
Password = "string",
Roles = new[]
{
new Zia.Inputs.AdminUsersRoleArgs
{
Id = 0,
},
},
AdminScopeType = "string",
});
example, err := zia.NewAdminUsers(ctx, "adminUsersResource", &zia.AdminUsersArgs{
Email: pulumi.String("string"),
Username: pulumi.String("string"),
LoginName: pulumi.String("string"),
IsPasswordExpired: pulumi.Bool(false),
IsProductUpdateCommEnabled: pulumi.Bool(false),
IsAuditor: pulumi.Bool(false),
IsExecMobileAppEnabled: pulumi.Bool(false),
IsNonEditable: pulumi.Bool(false),
AdminScopeEntities: &zia.AdminUsersAdminScopeEntitiesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
IsPasswordLoginAllowed: pulumi.Bool(false),
Disabled: pulumi.Bool(false),
IsSecurityReportCommEnabled: pulumi.Bool(false),
IsServiceUpdateCommEnabled: pulumi.Bool(false),
Comments: pulumi.String("string"),
Password: pulumi.String("string"),
Roles: zia.AdminUsersRoleArray{
&zia.AdminUsersRoleArgs{
Id: pulumi.Int(0),
},
},
AdminScopeType: pulumi.String("string"),
})
var adminUsersResource = new AdminUsers("adminUsersResource", AdminUsersArgs.builder()
.email("string")
.username("string")
.loginName("string")
.isPasswordExpired(false)
.isProductUpdateCommEnabled(false)
.isAuditor(false)
.isExecMobileAppEnabled(false)
.isNonEditable(false)
.adminScopeEntities(AdminUsersAdminScopeEntitiesArgs.builder()
.ids(0)
.build())
.isPasswordLoginAllowed(false)
.disabled(false)
.isSecurityReportCommEnabled(false)
.isServiceUpdateCommEnabled(false)
.comments("string")
.password("string")
.roles(AdminUsersRoleArgs.builder()
.id(0)
.build())
.adminScopeType("string")
.build());
admin_users_resource = zia.AdminUsers("adminUsersResource",
email="string",
username="string",
login_name="string",
is_password_expired=False,
is_product_update_comm_enabled=False,
is_auditor=False,
is_exec_mobile_app_enabled=False,
is_non_editable=False,
admin_scope_entities=zia.AdminUsersAdminScopeEntitiesArgs(
ids=[0],
),
is_password_login_allowed=False,
disabled=False,
is_security_report_comm_enabled=False,
is_service_update_comm_enabled=False,
comments="string",
password="string",
roles=[zia.AdminUsersRoleArgs(
id=0,
)],
admin_scope_type="string")
const adminUsersResource = new zia.AdminUsers("adminUsersResource", {
email: "string",
username: "string",
loginName: "string",
isPasswordExpired: false,
isProductUpdateCommEnabled: false,
isAuditor: false,
isExecMobileAppEnabled: false,
isNonEditable: false,
adminScopeEntities: {
ids: [0],
},
isPasswordLoginAllowed: false,
disabled: false,
isSecurityReportCommEnabled: false,
isServiceUpdateCommEnabled: false,
comments: "string",
password: "string",
roles: [{
id: 0,
}],
adminScopeType: "string",
});
type: zia:AdminUsers
properties:
adminScopeEntities:
ids:
- 0
adminScopeType: string
comments: string
disabled: false
email: string
isAuditor: false
isExecMobileAppEnabled: false
isNonEditable: false
isPasswordExpired: false
isPasswordLoginAllowed: false
isProductUpdateCommEnabled: false
isSecurityReportCommEnabled: false
isServiceUpdateCommEnabled: false
loginName: string
password: string
roles:
- id: 0
username: string
AdminUsers Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The AdminUsers resource accepts the following input properties:
- Email string
- Admin or auditor's email address.
- Login
Name string - Username string
- Admin or auditor's username.
- Admin
Scope zscaler.Entities Pulumi Package. Zia. Inputs. Admin Users Admin Scope Entities - list of destination ip groups
- Admin
Scope stringType - Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Is
Auditor bool - Is
Exec boolMobile App Enabled - Is
Non boolEditable - Is
Password boolExpired - Is
Password boolLogin Allowed - Is
Product boolUpdate Comm Enabled - Is
Security boolReport Comm Enabled - Is
Service boolUpdate Comm Enabled - Password string
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- Roles
List<zscaler.
Pulumi Package. Zia. Inputs. Admin Users Role> - Role of the admin. This is not required for an auditor.
- Email string
- Admin or auditor's email address.
- Login
Name string - Username string
- Admin or auditor's username.
- Admin
Scope AdminEntities Users Admin Scope Entities Args - list of destination ip groups
- Admin
Scope stringType - Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Is
Auditor bool - Is
Exec boolMobile App Enabled - Is
Non boolEditable - Is
Password boolExpired - Is
Password boolLogin Allowed - Is
Product boolUpdate Comm Enabled - Is
Security boolReport Comm Enabled - Is
Service boolUpdate Comm Enabled - Password string
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- Roles
[]Admin
Users Role Args - Role of the admin. This is not required for an auditor.
- email String
- Admin or auditor's email address.
- login
Name String - username String
- Admin or auditor's username.
- admin
Scope AdminEntities Users Admin Scope Entities - list of destination ip groups
- admin
Scope StringType - comments String
- Additional information about the admin or auditor.
- disabled Boolean
- is
Auditor Boolean - is
Exec BooleanMobile App Enabled - is
Non BooleanEditable - is
Password BooleanExpired - is
Password BooleanLogin Allowed - is
Product BooleanUpdate Comm Enabled - is
Security BooleanReport Comm Enabled - is
Service BooleanUpdate Comm Enabled - password String
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- roles
List<Admin
Users Role> - Role of the admin. This is not required for an auditor.
- email string
- Admin or auditor's email address.
- login
Name string - username string
- Admin or auditor's username.
- admin
Scope AdminEntities Users Admin Scope Entities - list of destination ip groups
- admin
Scope stringType - comments string
- Additional information about the admin or auditor.
- disabled boolean
- is
Auditor boolean - is
Exec booleanMobile App Enabled - is
Non booleanEditable - is
Password booleanExpired - is
Password booleanLogin Allowed - is
Product booleanUpdate Comm Enabled - is
Security booleanReport Comm Enabled - is
Service booleanUpdate Comm Enabled - password string
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- roles
Admin
Users Role[] - Role of the admin. This is not required for an auditor.
- email str
- Admin or auditor's email address.
- login_
name str - username str
- Admin or auditor's username.
- admin_
scope_ Adminentities Users Admin Scope Entities Args - list of destination ip groups
- admin_
scope_ strtype - comments str
- Additional information about the admin or auditor.
- disabled bool
- is_
auditor bool - is_
exec_ boolmobile_ app_ enabled - is_
non_ booleditable - is_
password_ boolexpired - is_
password_ boollogin_ allowed - is_
product_ boolupdate_ comm_ enabled - is_
security_ boolreport_ comm_ enabled - is_
service_ boolupdate_ comm_ enabled - password str
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- roles
Sequence[Admin
Users Role Args] - Role of the admin. This is not required for an auditor.
- email String
- Admin or auditor's email address.
- login
Name String - username String
- Admin or auditor's username.
- admin
Scope Property MapEntities - list of destination ip groups
- admin
Scope StringType - comments String
- Additional information about the admin or auditor.
- disabled Boolean
- is
Auditor Boolean - is
Exec BooleanMobile App Enabled - is
Non BooleanEditable - is
Password BooleanExpired - is
Password BooleanLogin Allowed - is
Product BooleanUpdate Comm Enabled - is
Security BooleanReport Comm Enabled - is
Service BooleanUpdate Comm Enabled - password String
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- roles List<Property Map>
- Role of the admin. This is not required for an auditor.
Outputs
All input properties are implicitly available as output properties. Additionally, the AdminUsers resource produces the following output properties:
Look up Existing AdminUsers Resource
Get an existing AdminUsers resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AdminUsersState, opts?: CustomResourceOptions): AdminUsers
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
admin_id: Optional[int] = None,
admin_scope_entities: Optional[AdminUsersAdminScopeEntitiesArgs] = None,
admin_scope_type: Optional[str] = None,
comments: Optional[str] = None,
disabled: Optional[bool] = None,
email: Optional[str] = None,
is_auditor: Optional[bool] = None,
is_exec_mobile_app_enabled: Optional[bool] = None,
is_non_editable: Optional[bool] = None,
is_password_expired: Optional[bool] = None,
is_password_login_allowed: Optional[bool] = None,
is_product_update_comm_enabled: Optional[bool] = None,
is_security_report_comm_enabled: Optional[bool] = None,
is_service_update_comm_enabled: Optional[bool] = None,
login_name: Optional[str] = None,
password: Optional[str] = None,
roles: Optional[Sequence[AdminUsersRoleArgs]] = None,
username: Optional[str] = None) -> AdminUsers
func GetAdminUsers(ctx *Context, name string, id IDInput, state *AdminUsersState, opts ...ResourceOption) (*AdminUsers, error)
public static AdminUsers Get(string name, Input<string> id, AdminUsersState? state, CustomResourceOptions? opts = null)
public static AdminUsers get(String name, Output<String> id, AdminUsersState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Admin
Id int - Admin
Scope zscaler.Entities Pulumi Package. Zia. Inputs. Admin Users Admin Scope Entities - list of destination ip groups
- Admin
Scope stringType - Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Email string
- Admin or auditor's email address.
- Is
Auditor bool - Is
Exec boolMobile App Enabled - Is
Non boolEditable - Is
Password boolExpired - Is
Password boolLogin Allowed - Is
Product boolUpdate Comm Enabled - Is
Security boolReport Comm Enabled - Is
Service boolUpdate Comm Enabled - Login
Name string - Password string
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- Roles
List<zscaler.
Pulumi Package. Zia. Inputs. Admin Users Role> - Role of the admin. This is not required for an auditor.
- Username string
- Admin or auditor's username.
- Admin
Id int - Admin
Scope AdminEntities Users Admin Scope Entities Args - list of destination ip groups
- Admin
Scope stringType - Comments string
- Additional information about the admin or auditor.
- Disabled bool
- Email string
- Admin or auditor's email address.
- Is
Auditor bool - Is
Exec boolMobile App Enabled - Is
Non boolEditable - Is
Password boolExpired - Is
Password boolLogin Allowed - Is
Product boolUpdate Comm Enabled - Is
Security boolReport Comm Enabled - Is
Service boolUpdate Comm Enabled - Login
Name string - Password string
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- Roles
[]Admin
Users Role Args - Role of the admin. This is not required for an auditor.
- Username string
- Admin or auditor's username.
- admin
Id Integer - admin
Scope AdminEntities Users Admin Scope Entities - list of destination ip groups
- admin
Scope StringType - comments String
- Additional information about the admin or auditor.
- disabled Boolean
- email String
- Admin or auditor's email address.
- is
Auditor Boolean - is
Exec BooleanMobile App Enabled - is
Non BooleanEditable - is
Password BooleanExpired - is
Password BooleanLogin Allowed - is
Product BooleanUpdate Comm Enabled - is
Security BooleanReport Comm Enabled - is
Service BooleanUpdate Comm Enabled - login
Name String - password String
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- roles
List<Admin
Users Role> - Role of the admin. This is not required for an auditor.
- username String
- Admin or auditor's username.
- admin
Id number - admin
Scope AdminEntities Users Admin Scope Entities - list of destination ip groups
- admin
Scope stringType - comments string
- Additional information about the admin or auditor.
- disabled boolean
- email string
- Admin or auditor's email address.
- is
Auditor boolean - is
Exec booleanMobile App Enabled - is
Non booleanEditable - is
Password booleanExpired - is
Password booleanLogin Allowed - is
Product booleanUpdate Comm Enabled - is
Security booleanReport Comm Enabled - is
Service booleanUpdate Comm Enabled - login
Name string - password string
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- roles
Admin
Users Role[] - Role of the admin. This is not required for an auditor.
- username string
- Admin or auditor's username.
- admin_
id int - admin_
scope_ Adminentities Users Admin Scope Entities Args - list of destination ip groups
- admin_
scope_ strtype - comments str
- Additional information about the admin or auditor.
- disabled bool
- email str
- Admin or auditor's email address.
- is_
auditor bool - is_
exec_ boolmobile_ app_ enabled - is_
non_ booleditable - is_
password_ boolexpired - is_
password_ boollogin_ allowed - is_
product_ boolupdate_ comm_ enabled - is_
security_ boolreport_ comm_ enabled - is_
service_ boolupdate_ comm_ enabled - login_
name str - password str
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- roles
Sequence[Admin
Users Role Args] - Role of the admin. This is not required for an auditor.
- username str
- Admin or auditor's username.
- admin
Id Number - admin
Scope Property MapEntities - list of destination ip groups
- admin
Scope StringType - comments String
- Additional information about the admin or auditor.
- disabled Boolean
- email String
- Admin or auditor's email address.
- is
Auditor Boolean - is
Exec BooleanMobile App Enabled - is
Non BooleanEditable - is
Password BooleanExpired - is
Password BooleanLogin Allowed - is
Product BooleanUpdate Comm Enabled - is
Security BooleanReport Comm Enabled - is
Service BooleanUpdate Comm Enabled - login
Name String - password String
- The admin's password. If admin single sign-on (SSO) is disabled, then this field is mandatory for POST requests. This information is not provided in a GET response.
- roles List<Property Map>
- Role of the admin. This is not required for an auditor.
- username String
- Admin or auditor's username.
Supporting Types
AdminUsersAdminScopeEntities, AdminUsersAdminScopeEntitiesArgs
- Ids List<int>
- Ids []int
- ids List<Integer>
- ids number[]
- ids Sequence[int]
- ids List<Number>
AdminUsersRole, AdminUsersRoleArgs
- Id int
- Id int
- id Integer
- id number
- id int
- id Number
Import
Zscaler offers a dedicated tool called Zscaler-Terraformer to allow the automated import of ZIA configurations into Terraform-compliant HashiCorp Configuration Language.
Visit
zia_admin_users can be imported by using <ADMIN ID>
or <LOGIN NAME>
as the import ID.
For example:
$ pulumi import zia:index/adminUsers:AdminUsers example <admin_id>
or
$ pulumi import zia:index/adminUsers:AdminUsers example <login_name>
⚠️ NOTE :: This provider do not import the password attribute value during the importing process.
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
- This Pulumi package is based on the
zia
Terraform Provider.